General

  • Target

    Oxlo (1).exe

  • Size

    13.2MB

  • MD5

    e01c259ea4e8e6f35479d26e40cf1a75

  • SHA1

    361aa68bc5e5055a06e4d3689b8ba0612a595614

  • SHA256

    4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7

  • SHA512

    220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf

  • SSDEEP

    393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Oxlo (1).exe
    .exe windows:5 windows x64 arch:x64

    1af6c885af093afc55142c2f1761dbe8


    Headers

    Imports

    Sections

  • Creal.pyc